• Title/Summary/Keyword: 컴퓨터 바이러스

Search Result 242, Processing Time 0.02 seconds

The Design of Active Storage Virtualization System for Information Protection (정보보호를 위한 능동적 스토리지 가상화 시스템 설계)

  • Cho, Kyoung-Ok;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.9
    • /
    • pp.2040-2048
    • /
    • 2010
  • In contemporary society, though convenience and efficiency of work using information system is growing high, adverse effect problems of malignant code, system hacking, information leak by insiders due to the development of the network are raising their head daily. Because of this, enormous work forces and expenses for the recovery and management of system is needed. The existing system can be divided into two aspects: security solution which surveils and treats virus and malignant codes, and network management solution which observes the system of computer, and practices maintenance and repair such as management, recovery, backup. This treatise applied Active Write Filter mechanism and the technology based on NFS and complemented the maintenance problems of user data of the existing system and designed the system which enables solving problems of intellectual property right such as information protection and illegal work.

The Effects of Information Security Policies, Security Controls and User's Characteristics on Anti-Virus Security Effectiveness (정보보안정책, 보안통제 및 사용자특성이 정보보안효과에 미치는 영향: 컴퓨터 바이러스를 중심으로)

  • Kim Jong-Ki;Jeon Jin-Hwan;Lim Ho-Seob
    • The Journal of Information Systems
    • /
    • v.15 no.1
    • /
    • pp.145-168
    • /
    • 2006
  • Current computer viruses are one of the most serious problems in information age due to their potential demage and impact on use of information systems. To make the problem worse, virus development technology has been advanced rapidly, and use of network systems has expanded widely. Therefore computer viruses are much more complex and use of anti-virus software(AV S/W) is not enough to prrevent virus incidents. It implies that computer viruses as well as other information security matters are not solely a technical problem but also a managerial one. This study emphasized on computer virus controls from managerial perspective of information security and investigated factors influencing the effectiveness of computer virus controls. Organization's comprehensive security policies provide guidelines on how organization or individual can protect themselves from computer viruses. Especially, user's education has positive impact on user's security related characteristics. Based on the analysis of research model using structural equation modeling technique, security policies were influencing security controls and improving user's computer viruses related awareness. Also security controls had positive impact on security effectiveness. However, no significant relationship was found between user's security related characteristics and security effectiveness.

  • PDF

A study on Twofish Cryptoalgorithm Design for Security in the PC Peripheral devices (PC 주변기기에 대한 보안성을 위한 Twofish 암호알고리즘 설계에 관한 연구)

  • Jeong, Woo-Yeol;Lee, Seon-Keun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.2 no.2
    • /
    • pp.118-122
    • /
    • 2007
  • The previous security system was PCI way which has many difficulties for PC novices to use. Moreover the security programs in use are mostly unverified ones as they are using cracks, and are exposed to attacks such as hackers and viruses. Therefore this thesis describes to design the security system of Twofish cryptographic algorithm using USB, which it can be used in general-purpose computers and users can handle it with ease. Users can easily use the security system by using this USB and it is applicable to various security systems that Twofish cryptographic algorithm used in the security system by having variable key length. Also the efficiency of the system can be enhanced as it can perform both encryption and decryption and it has a benefit of downsizing hardware.

  • PDF

An Implementation and Evaluation of FQDN Check System to Filter Junk Mail (정크메일 차단을 위한 FQDN 확인 시스템의 구현 및 평가)

  • Kim Sung-Chan;Lee Sang-Hun;Jun Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.12C no.3 s.99
    • /
    • pp.361-368
    • /
    • 2005
  • Internet mail has become a common communication method around the world because of tremendous Internet service usage increment. In other respect, Most Internet users' mail addresses are exposed to spammer, and the damage of Junk mail is growing bigger and bigger. These days, Junk mail delivery problem is becoming more serious, because this is used for an attack or propagation scheme of malicious code. It's a most dangerous dominant cause for computer system accident. This paper shows the Junk mail filtering model and implementation which is based on FQDN (Fully Qualified Domain Name) check and evaluates it for proposing advanced scheme against Junk mail.

Query Processing of Spatio-temporal Trajectory for Moving Objects (이동 객체를 위한 시공간 궤적의 질의 처리)

  • Byoungwoo Oh
    • Journal of Platform Technology
    • /
    • v.11 no.1
    • /
    • pp.52-59
    • /
    • 2023
  • The importance of spatio-temporal trajectories for contact tracing has increased due to the recent COVID-19 pandemic. Spatio-temporal trajectories store time and spatial data of moving objects. In this paper, I propose query processing for spatio-temporal trajectories of moving objects. The spatio-temporal trajectory model of moving objects has point type spatial data for storing locations and timestamp type temporal data for time. A trajectory query is a query to search for pairs of users who have been in close contact by boarding the same bus. To process the trajectory query, I use the Geolife dataset provided by Microsoft. The proposed trajectory query processing method divides trajectory data by date and checks whether users' trajectories were nearby for each date to generate information about contacts as the result.

  • PDF

Technology Development for Non-Contact Interface of Multi-Region Classifier based on Context-Aware (상황 인식 기반 다중 영역 분류기 비접촉 인터페이스기술 개발)

  • Jin, Songguo;Rhee, Phill-Kyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.6
    • /
    • pp.175-182
    • /
    • 2020
  • The non-contact eye tracking is a nonintrusive human-computer interface providing hands-free communications for people with severe disabilities. Recently. it is expected to do an important role in non-contact systems due to the recent coronavirus COVID-19, etc. This paper proposes a novel approach for an eye mouse using an eye tracking method based on a context-aware based AdaBoost multi-region classifier and ASSL algorithm. The conventional AdaBoost algorithm, however, cannot provide sufficiently reliable performance in face tracking for eye cursor pointing estimation, because it cannot take advantage of the spatial context relations among facial features. Therefore, we propose the eye-region context based AdaBoost multiple classifier for the efficient non-contact gaze tracking and mouse implementation. The proposed method detects, tracks, and aggregates various eye features to evaluate the gaze and adjusts active and semi-supervised learning based on the on-screen cursor. The proposed system has been successfully employed in eye location, and it can also be used to detect and track eye features. This system controls the computer cursor along the user's gaze and it was postprocessing by applying Gaussian modeling to prevent shaking during the real-time tracking using Kalman filter. In this system, target objects were randomly generated and the eye tracking performance was analyzed according to the Fits law in real time. It is expected that the utilization of non-contact interfaces.

A Study on Problems and Improvement Plans of Non-Face-to-Face Midi Classes (비대면 미디 수업의 문제점과 개선 방안 연구)

  • Baek, Sung-Hyun
    • Journal of Korea Entertainment Industry Association
    • /
    • v.15 no.4
    • /
    • pp.267-277
    • /
    • 2021
  • Both teachers and learners should participate in non-face-to-face class due to COVID-19. The non-face-to-face class has brought about many problems, where they made adequate preparations for such abrupt situation. This study attempted to understand and improve problems occurring during non-face-to-face midi class. The findings are as follows: First, there were differences in equipment available to contact and non-face-to-face class. Such a problem could be improved by using Reaper, DAW which can be installed and freely utilized without any functional limits, regardless of the types of operating systems. Second, latency could not be reduced, when the screen share function of Zoom was used, since it was impossible to select audio interface's drivers in DAW. This problem was improved by again receiving audio output as input and sending it, from the perspectives of teachers. In addition, learners who used the operating system of Windows and have no audio interfaces usually suffer from latency during practices. The latency can be reduced by installing Asio4all. Third, image degradation and screen disconnection phenomena occurred due to the lack of resource. Two computers were connected by using a capture board and the screen disconnection phenomena could be improved by distributing resources and maintaining high-resolution. The system for allowing non-face-to-face midi class could be successfully established, as one more computer was connected by using Vienna Ensemble Pro and more plug-ins were used by securing additional resources. Consequently, the problems of non-face-to-face midi class could be understood and improved.

A Comparison of Pre-Processing Techniques for Enhanced Identification of Paralichthys olivaceus Disease based on Deep Learning (딥러닝 기반 넙치 질병 식별 향상을 위한 전처리 기법 비교)

  • Kang, Ja Young;Son, Hyun Seung;Choi, Han Suk
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.3
    • /
    • pp.71-80
    • /
    • 2022
  • In the past, fish diseases were bacterial in aqua farms, but in recent years, the frequency of fish diseases has increased as they have become viral and mixed. Viral diseases in an enclosed space called a aqua farm have a high spread rate, so it is very likely to lead to mass death. Fast identification of fish diseases is important to prevent group death. However, diagnosis of fish diseases requires a high level of expertise and it is difficult to visually check the condition of fish every time. In order to prevent the spread of the disease, an automatic identification system of diseases or fish is needed. In this paper, in order to improve the performance of the disease identification system of Paralichthys olivaceus based on deep learning, the existing pre-processing method is compared and tested. Target diseases were selected from three most frequent diseases such as Scutica, Vibrio, and Lymphocystis in Paralichthys olivaceus. The RGB, HLS, HSV, LAB, LUV, XYZ, and YCRCV were used as image pre-processing methods. As a result of the experiment, HLS was able to get the best results than using general RGB. It is expected that the fish disease identification system can be advanced by improving the recognition rate of diseases in a simple way.

A Point of View on the Use of Fractals in Art Therapy (미술치료에서 프랙탈의 활용방안에 관한 소고)

  • Lee, Hyun-Jee;Yeon, Ohk-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.11
    • /
    • pp.354-367
    • /
    • 2020
  • This study is on the consideration of the scope of application of art therapy and fractal through the review of literature at home and abroad. The complex system is the opposite of the Euclidean system, a concept suitable for understanding the contemporaries with ambiguous boundaries and decentralized phenomena. The self-similarity and inventiveness of fractal, the geometry of nature, is used as fractal art in art as well as tree trunk, cloud and plant, especially in art therapy, fractal is considered to be available in the field of mandala and neuroscience. From brain-based research to mandala, exposure to natural patterns, clinical diagnosis through fractal analysis and software development, fractal has potential elements that can be developed in art therapy. Fractal, which is easy to link with computers due to its nature, is a necessary study at this point when non-face-to-face contact with the Corona virus is recommended. Currently, research on fractal art therapy is insufficient in Korea. Therefore, this research is intended to present as a basis for scientific and objective diagnostic tools and treatment at clinical sites using art therapy using fractal.

Automatic Binary Execution Environment based on Real-machines for Intelligent Malware Analysis (지능형 악성코드 분석을 위한 리얼머신 기반의 바이너리 자동실행 환경)

  • Cho, Homook;Yoon, KwanSik;Choi, Sangyong;Kim, Yong-Min
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.3
    • /
    • pp.139-144
    • /
    • 2016
  • There exist many threats in cyber space, however current anti-virus software and other existing solutions do not effectively respond to malware that has become more complex and sophisticated. It was shown experimentally that it is possible for the proposed approach to provide an automatic execution environment for the detection of malicious behavior of active malware, comparing the virtual-machine environment with the real-machine environment based on user interaction. Moreover, the results show that it is possible to provide a dynamic analysis environment in order to analyze the intelligent malware effectively, through the comparison of malicious behavior activity in an automatic binary execution environment based on real-machines and the malicious behavior activity in a virtual-machine environment.